Computer security (Page 1)

the protection of computer systems and networks from theft, damage, misuse or data leak

  1. Explore » 
  2. computer science » 
  3. Computer security
Subconcepts:
  1. Access control
  2. Acknowledgement
  3. Adversary
  4. Airport security
  5. Anonymity
  6. Approx
  7. Asset (computer security)
  8. Attack model
  9. Attack surface
  10. Authentication (law)
  11. Authorization
  12. Automatic Identification System
  13. Backdoor
  14. Battlespace
  15. Biometrics
  16. Bit (key)
  17. Blacklist
  18. Blacklisting
  19. Block cipher mode of operation
  20. Blockchain
  21. Bridging (networking)
  22. Broadcast communication network
  23. Broadcasting (networking)
  24. Brute force
  25. Business continuity
  26. CAPTCHA
  27. CHAOS (operating system)
  28. Camellia
  29. Campus network
  30. Capstone
  31. Card reader
  32. Cheque
  33. Classified information
  34. Collision
  35. Common Criteria
  36. Computer fraud
  37. Computer security model
  38. Computer users
  39. Computer virus
  40. Confidentiality
  41. Contingency plan
  42. Counterintelligence
  43. Credential
  44. Credit history
  45. Criminal record
  46. Critical infrastructure
  47. Crowds
  48. Crowdsensing
  49. Crypt
  50. Cryptocurrency
  51. Cryptography
  52. Cyber threats
  53. Cyber-attack
  54. Cyberwarfare
  55. Data Protection Act 1998
  56. Data breach
  57. Data deduplication
  58. Data integrity
  59. Data retention
  60. Database security
  61. Default gateway
  62. Dig
  63. Digital forensics
  64. Digital rights
  65. Digital rights management
  66. Distributed File System
  67. Downgrade
  68. Eavesdropping
  69. Echo (communications protocol)
  70. Electronic surveillance
  71. Emergency procedure
  72. Encapsulation (networking)
  73. Encryption
  74. End-to-end principle
  75. Enterprise information security architecture
  76. Enterprise private network
  77. Ephemeral key
  78. Escrow
  79. Exploit
  80. FREAK
  81. Feedback loop
  82. Fingerprint (computing)
  83. Fortuna
  84. Fugue (hash function)
  85. Full disclosure
  86. GOST (hash function)
  87. Hacker
  88. Handshaking
  89. Hash function
  90. Heartbeat
  91. Home security
  92. Honeypot
  93. Identity theft
  94. Incident management
  95. Incident report
  96. Incident response
  97. Industrial espionage
  98. Information Operations
  99. Information leakage
  100. Information policy
  101. Information privacy
  102. Information protection policy
  103. Information security
  104. Information sensitivity
  105. Information warfare
  106. Integrated services
  107. Intelligence analysis
  108. Internet of Things
  109. Intrusion detection system
  110. Key (lock)
  111. Keystroke logging
  112. LEVIATHAN (cipher)
  113. Location data
  114. Login
  115. MAC address
  116. Malware
  117. Misinformation
  118. Mobile banking
  119. Mulligan
  120. Multicast
  121. Need to know
  122. NetFlow
  123. Network Access Protection
  124. Network address
  125. Network administrator
  126. Network architecture
  127. Network packet
  128. Network security
  129. Network service
  130. Network-centric warfare
  131. Obfuscation
  132. Opt-in email
  133. Organizational unit
  134. Overdraft
  135. Padding
  136. Panama
  137. Password
  138. Pepper
  139. Personally identifiable information
  140. Physical security
  141. Ping (video games)
  142. Preventive action
  143. Principal (computer security)
  144. Privacy protection
  145. Private information retrieval
  146. Private network
  147. Privilege (computing)
  148. Proxy server
  149. Public records
  150. RADIUS
  151. Rabbit (cipher)
  152. Radio-frequency identification
  153. Rambutan
  154. Random number generation
  155. Real-time communication
  156. Red Cell
  157. Retention rate
  158. Right to privacy
  159. Risk assessment
  160. SAFER
  161. SAINT
  162. STRIDE
  163. Seclusion
  164. Secrecy
  165. Security analysis
  166. Security community
  167. Security domain
  168. Security guard
  169. Security management
  170. Security policy
  171. Security system
  172. Security token
  173. Self-service
  174. Shared resource
  175. Skein
  176. Smart card
  177. Social engineering (security)
  178. Spoofing attack
  179. Subnetwork
  180. SwIPe
  181. System administrator
  182. Tactical communications
  183. Tamper resistance
  184. Tempest
  185. Threat assessment
  186. Threat model
  187. Ticket
  188. Tiger
  189. Timestamp
  190. Traffic analysis
  191. Traffic flow (computer networking)
  192. Transparency (behavior)
  193. Transshipment (information security)
  194. Trojan
  195. Trojan horse
  196. Trust management (information system)
  197. Trusted Computing
  198. Trusted Platform Module
  199. Trusted third party
  200. Trustworthiness
  201. Universal Plug and Play
  202. VEST
  203. Ven
  204. Vetting
  205. Virtual LAN
  206. Vulnerability (computing)
  207. Zombie
  208. nobody
Papers in this category: 3458024 Current Page: 1 / 100
MAG: 1000000349
1984
The importance of parasitic entomophages and ways of increasing their effectiveness in forests.
MAG: 1000000686
1996
广州幅(F49)南半幅—海南岛幅(E49)海域新生代沉积盆地分布和油气资源
MAG: 1000001125
2001
Molluscs of the river Muchawka and selected habitat factors
MAG: 1000001352
2013
ANKARA SANCAĞI’NDA KARAKEÇİLİLERİN SOSYO-EKONOMİK VAZİYETİ (1620-1720)
MAG: 1000003278
2011
Premios Nacionales 2010: los más selectos del Estado de Chile.
MAG: 1000003482
2000
Patologías más frecuentes del área perianal
MAG: 1000003849
1999
La evaluación en bachillerato: una perspectiva práctica
MAG: 1000003881
1990
非吸烟烟草对BALB/3T3 A31—1—13细胞的转化活性
DOI: 10.14597/infraeco.2014.4.2.090
2014
Wpływ długotrwałego gromadzenia odpadów z cmentarzy na zmianę ich masy
MAG: 1000005846
2010
Trophy Phrases vs Long Tail Search Terms
MAG: 100000600
1990
Los tallos de la vid: cultivo del viñedo
MAG: 1000007130
1997
哲学家在做什么?──评任恢忠《物质、意识、场》
MAG: 1000007405
1993
AMIC Seminar on Participatory Communication for Environmental Management : Kuala Lumpur Mar 30-Apr 2, 1993 : [closing address]
MAG: 1000008429
1999
“大容量”的诱惑——如何选择大容量电子邮件系统
MAG: 100000846
1996
Cited 6 times
Emergency medical care following the great Hanshin-Awaji earthquake: practices and proposals (a report from a university hospital located in the damaged region).
DOI: 10.1017/cbo9780511628382.010
1996
Notes
MAG: 1000009618
2006
Survey: Upstream Sector Oil and Natural Gas Most Profitable in China
MAG: 1000010178
2011
Analisis Kualitas Air di Hutan Wisata Sungai Dumai sebagai Kajianuntuk Kegiatan Pengelolaan Wisata Alam Bunga Tujuh
MAG: 1000010520
2015
Álbum comparativo da cidade de São Paulo 1862-1887 - Rio Tieté
MAG: 1000011119
2011
Jorge Salinas incursionara en el teatro experimental
MAG: 1000012203
1921
Port of Algiers
DOI: 10.6092/unibo/amsdottorato/1016
2008
Is Mozambique the new south african frontier?The socio-economic impact of the Great Limpopo Transfrontier Conservation Area on the livelihood strategies of border communities in the Pafuri administrative post
MAG: 1000014842
2004
以“肝脏”为核心的专题复习
MAG: 100001526
2001
Implicacions dels mercats de futurs i opcions sobre bestiar en viu: anàlisi de la possibilitat d'implantació en territori català
MAG: 1000015521
2005
大学城的另类定位——广州旅游的“太阳”
MAG: 1000015956
1976
Aspectos jurídicos del comercio internacional como promoción del desarrollo económico
MAG: 1000016420
2011
Los caminos del agua
MAG: 1000018412
2004
Studi habitat dan pakan rusa Bawean (Axis kuhlii) di SUaka Margasatwa Pulau Bawean, Kabupaten Gresik, Jawa Timur
MAG: 1000018485
2015
On the up: UK growth forecast improves for next two years
MAG: 1000018802
2010
Aplikasi Metode Keandalan Waktu Perjalanan Dalam Pemilihan Rute Di Perumnas Mandala
MAG: 1000019151
2008
Co-host Cities of the Beijing Olympic Games
DOI: 10.3133/ofr729
1972
Geologic map of NE part of Spanish Fork Peak Quadrangle, Utah
DOI: 10.1007/978-94-017-8759-8_11
2014
Chinese Migration to Japan, 1978–2010: Patterns and Policies
MAG: 100002112
2012
Alfonso Domingo: entrevista: "cada uno ve en El Bosco lo que quiere ver"
MAG: 1000021746
1985
Inventario floristico de las plantas indeseables en dos regiones citricolas del pais
MAG: 100002191
1997
Cited 3 times
Historia de la alimentación mediterránea
MAG: 1000022444
2011
Modern problems of organization of search, rescue and rendering assistanse in sea acidents. Review.
MAG: 1000023992
2010
Ecotourism Achievements and Challenges in China and the World
MAG: 100002529
2005
Brukarnas krav i byggprocessen : en fallstudie
MAG: 1000026568
2001
Cited 9 times
The Professional Accountancy Bodies and the Provision of Education and Training in Relation to Environmental Issues
MAG: 1000026579
2000
Figuraciones para una nueva emoción (cuatro notas. verano 2000
MAG: 1000026725
2008
MAPPING PARKING SYSTEM
MAG: 100002674
2011
NATURAL AND CULTURAL HERITAGE TOURISM POTENTIAL AND SUSTAINABLE PLANNING PROPOSAL FOR ELMALI, ANTALYA
MAG: 100002745
2007
Marketing móvil: una nueva herramienta de comunicación : análisis y nuevas perspectivas para el mercado español
MAG: 100002815
2011
Impactes da mobilidade no modelo urbano: a sustentabilidade do transporte público
DOI: 10.1023/a:1007447308678
1998
Cited 21 times
The effects of interactions with reef residents on the settlement
MAG: 1000028279
1988
La representación de la realidad en "El Mercader de Venecia"
MAG: 100002856
2011
Heritage at risk. Local development, a strategy for its control: historic quarter of the City of Colonia del Sacramento
MAG: 1000028781
2001
La politica sanitaria en la ganaderia andaluza.
MAG: 1000029991
2009
LibGuides: * Jewish Studies: Sample testimonies
DOI: 10.1007/978-1-4020-4948-4_12
2006
Cited 7 times
Medicinal plants in tropical homegardens
MAG: 100003126
1999
Cited 4 times
Gaudí, l'home i l'obra
MAG: 1000031813
2008
Analysis of an Epidemic Outbreak of Keratoconjunctivitis in Medical Residents
MAG: 1000031946
1992
Pandangan dunia ekologis dalam desert Solitaire karya Edward Abbey (Ecological Worldview in Edward Abbey's Desert Solitaire)
MAG: 100003318
1992
Centros de documentación sobre el mundo árabe e Islam
MAG: 1000034781
2002
Procesos de aprendizaje y formación docente en condiciones de extrema diversidad
MAG: 1000034952
2014
台灣證券交易所「收盤前資訊揭露」對投資人情緒、市場報酬與波動度之關聯性研究
MAG: 1000035346
2007
崇高风范 泽被长淮——彭雪枫将军牺牲前后的故事
DOI: 10.1501/ankara-24313
2010
Gediz havzasında don risk tarihlerinin değerlendirilmesi
MAG: 1000035744
1974
Terra rossa. Área de estudio: Cuenca del Guadalquivir. Localización: Puebla de los Infantes, Sevilla
MAG: 1000036419
1994
Cited 5 times
Quantitative and qualitative changes of the phytoplankton in heated Konin lakes
DOI: 10.3133/93811
2005
Evaluating the impacts of white-tailed deer (Odocoileus virginianus) on vegetation within Pea Ridge National Military Park
MAG: 1000037274
2006
Adjustment time of the first baroclinic Rossby wave in the global oceans
MAG: 1000037341
1987
A conceptual method for monitoring locust habitat
DOI: 10.5848/csp.2434.00002
2015
The NATO Club and Afghanistan: Northern, Rich, and White Nations Defend the Imperial Palace
DOI: 10.1007/978-3-540-77587-4_156
2010
Cited 5 times
Microbial Communities in Oil Shales, Biodegraded and Heavy Oil Reservoirs, and Bitumen Deposits
MAG: 1000039826
1954
Discurso de contestación por... José Caruana Reig, Barón de San Petrillo
MAG: 1000040141
2000
石黝炉原子吸收法直接测定酒,饮料中铜,锰,铅
DOI: 10.1007/3-540-26676-3_9
2005
Local Government Perceptions of Urban Forestry
DOI: 10.7560/746435
1985
Cited 3 times
The Lowland Maya Postclassic
MAG: 1000041348
2013
Juan Ramírez de Lucas: La Luminosa pasión de García Lorca
MAG: 1000041603
2010
Corner of Frederick Street and Marine Square, Trinidad
MAG: 1000042516
2009
学画三味——浅谈中国画的真、善、美
DOI: 10.1038/176590a0
1955
Locust Research: Discussions in London
MAG: 1000042977
2000
轮状病毒(HRV)胃肠炎防治研究进展
MAG: 1000043616
2010
吴江文化环境与“吴江派”的生成
DOI: 10.1017/cbo9780511706196.001
2010
PREFACE
MAG: 1000044004
2002
Революционный террор во Франции XVIII века: новейшие интерпретации
MAG: 1000046263
1987
Europa occidental-América Latina, experiencias y desafíos
DOI: 10.1017/cbo9780511782367.001
2010
THE MOLUCCAS—TERNATE
MAG: 1000048385
2014
Геосистемный подход в формировании региональных систем особо охраняемых природных территорий (на примере Свердловской области)
MAG: 1000048534
1999
Contrastación de hipótesis explicativas de la distribución de la diversidad específica de arañas ( Arachnida, araneae ) en las islas Canarias
MAG: 1000048737
1986
A Watershed Event: China’s Shakespeare Festival
MAG: 1000048889
2003
Caracterización arqueométrica de la producción cerámica numantina: tesis doctoral presentada por Manuel García Heras
MAG: 1000049223
2013
RESEARCHES ON THE COAST OF SOMALIA. HETEROCHEIRA MARTELLII ARDOIN, 1974 (COLEOPTERA TENEBRIONIDAE): FIRST DESCRIPTION OF THE LARVA AND PUPA
MAG: 1000049443
2012
Prime osservazioni sul controllo interno nelle s.r.l.
MAG: 1000049508
2014
Animales de ciudad: algunas especies cambian de hábitos para adaptarse al medio urbano
MAG: 1000050324
2004
A study about DWCRA and the economic participation of women and children in Kerala
MAG: 1000050516
2015
MACROFLORAL ANALYSIS, CHARCOAL IDENTIFICATION, BONE COLLAGEN EXTRACTION, AND AMS RADIOCARBON AGE DETERMINATION OF SAMPLES FROM THE FORT LOOKOUT II SITE (39LM0057), LYMAN COUNTY, SOUTH DAKOTA
MAG: 1000051
1994
El contexto: su naturaleza y su papel en el proceso de interpretación de enunciados
MAG: 1000051846
1987
Las Segunda campaña de excavaciones en el yacimiento del "Macerado" (Leciñena- Perdiguera, Zaragoza). Noticia preliminar
MAG: 1000052305
2012
七年级英语(上)寒假自测卷二
MAG: 1000052571
2000
Characterisation of olive germplasm from Marche Region.
MAG: 1000052698
2007
L' uso di "Corylus colurna" per la selezione di portinnesti monocaule del nocciolo
DOI: 10.1007/978-90-481-9744-6_8
2011
Dynamics in the Formation of Ecological Knowledge
MAG: 100005359
1989
The Global Dimensions of Africa's Crisis: Debts, Structural Adjustment, and Workers
MAG: 1000053670
1989
Women in the centre. Women, planning and Birmingham City Centre
MAG: 1000053798
2004
Voraussichtliche Entwicklung der Schulabgängerzahlen in Baden-Württemberg bis 2020
MAG: 1000054119
1989
Carta abierta para el homenaje a Julian Pitt-Rivers
MAG: 1000054280
2011
论“人才以用为本”的有效落实机制
Papers in this category: 3458024 Current Page: 1 / 100